首页 > 最新文献

International journal of network security & its applications最新文献

英文 中文
Reducing risk with end-to-end application security automation 通过端到端应用程序安全自动化降低风险
Pub Date : 2020-02-01 DOI: 10.1016/s1353-4858(20)30019-2
Cindy Blake
{"title":"Reducing risk with end-to-end application security automation","authors":"Cindy Blake","doi":"10.1016/s1353-4858(20)30019-2","DOIUrl":"https://doi.org/10.1016/s1353-4858(20)30019-2","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"88 1","pages":"6-8"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85594145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Signs of things to come? 预示着即将发生的事情?
Pub Date : 2020-02-01 DOI: 10.1016/s1353-4858(20)30022-2
K. MacMillan
{"title":"Signs of things to come?","authors":"K. MacMillan","doi":"10.1016/s1353-4858(20)30022-2","DOIUrl":"https://doi.org/10.1016/s1353-4858(20)30022-2","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"15 1","pages":"20"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73012471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dissecting .NET ransomware: key generation, encryption and operation 解析。net勒索软件:密钥生成、加密和操作
Pub Date : 2020-02-01 DOI: 10.1016/s1353-4858(20)30020-9
Pranshu Bajpai, R. Enbody
{"title":"Dissecting .NET ransomware: key generation, encryption and operation","authors":"Pranshu Bajpai, R. Enbody","doi":"10.1016/s1353-4858(20)30020-9","DOIUrl":"https://doi.org/10.1016/s1353-4858(20)30020-9","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"1 1","pages":"8-14"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77171370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Self-organization and Autonomous Network Survey 自组织和自治网络调查
Pub Date : 2020-01-31 DOI: 10.5121/ijnsa.2020.12102
Houneida Sakly
The autonomic network gathers several aspects of Self-organization, which is depicted, into different autonomous function such as the Self- configuration, the Self-optimization, the Self-repair, the Selfprotection, and the Self-cure. The latter is considered as one of the autonomous functions wished of a system network, which could be described by autonomous behavior is realized by structures of the control loops and loop of control.
自治网络将描述的自组织的几个方面集合成不同的自治功能,如自配置、自优化、自修复、自保护和自修复。后者被认为是系统网络所希望的自治功能之一,可以用自治行为来描述,自治行为是通过控制回路和控制回路的结构来实现的。
{"title":"Self-organization and Autonomous Network Survey","authors":"Houneida Sakly","doi":"10.5121/ijnsa.2020.12102","DOIUrl":"https://doi.org/10.5121/ijnsa.2020.12102","url":null,"abstract":"The autonomic network gathers several aspects of Self-organization, which is depicted, into different autonomous function such as the Self- configuration, the Self-optimization, the Self-repair, the Selfprotection, and the Self-cure. The latter is considered as one of the autonomous functions wished of a system network, which could be described by autonomous behavior is realized by structures of the control loops and loop of control.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"12 1","pages":"19-29"},"PeriodicalIF":0.0,"publicationDate":"2020-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86901579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Providing Anonymous Communication, Privacy-Preserving Data Aggregation and Dynamic Billing System in Smart Grid Using Permissioned Blockchain 利用许可区块链在智能电网中提供匿名通信、保密数据聚合和动态计费系统
Pub Date : 2020-01-25 DOI: 10.5121/CSIT.2020.100106
Ozgur Oksuz
This paper proposes an efficient data aggregation and dynamic billing system that it consists of a permissioned blockchain. This blockchain contains a ledger that keeps users’ anonimized identities and electricity consumption for predefined time ranges. Using consumption data of users, a billing mechanism is able to bill the users accordingly. In the construction, since all the parties in the system have the ledger, every party has the aggregated usage of the electricity without using very heavy cryptographic operations such as homomorphic encryption, bilinear pairing, etc. Using the ledgers in our model, the aggregation of the users’ electricity consumption can be computed by anyone in the system. Moreover, users are able to verify their bills and check any data using a signature scheme. This results that integrity of all data is going to be preserved. The proposed approach mainly uses hash functions to provide the same functionality (aggregation of the users’ data consumption, data integrity check and dynamic pricing and billing) with preserving data privacy of the users.
本文提出了一种高效的数据聚合和动态计费系统,该系统由一个允许的区块链组成。这个区块链包含一个分类帐,用于保存用户的匿名身份和预定义时间范围内的用电量。使用用户的消费数据,计费机制能够相应地向用户计费。在构建过程中,由于系统各方都有账本,因此无需使用非常繁重的加密操作,如同态加密、双线性配对等,各方都有汇总的用电量。使用我们模型中的分类账,系统中的任何人都可以计算出用户用电量的总和。此外,用户可以使用签名方案验证他们的账单和检查任何数据。这就保证了所有数据的完整性。该方法主要使用哈希函数提供相同的功能(用户数据消费聚合、数据完整性检查和动态定价计费),同时保护用户的数据隐私。
{"title":"Providing Anonymous Communication, Privacy-Preserving Data Aggregation and Dynamic Billing System in Smart Grid Using Permissioned Blockchain","authors":"Ozgur Oksuz","doi":"10.5121/CSIT.2020.100106","DOIUrl":"https://doi.org/10.5121/CSIT.2020.100106","url":null,"abstract":"This paper proposes an efficient data aggregation and dynamic billing system that it consists of a permissioned blockchain. This blockchain contains a ledger that keeps users’ anonimized identities and electricity consumption for predefined time ranges. Using consumption data of users, a billing mechanism is able to bill the users accordingly. In the construction, since all the parties in the system have the ledger, every party has the aggregated usage of the electricity without using very heavy cryptographic operations such as homomorphic encryption, bilinear pairing, etc. Using the ledgers in our model, the aggregation of the users’ electricity consumption can be computed by anyone in the system. Moreover, users are able to verify their bills and check any data using a signature scheme. This results that integrity of all data is going to be preserved. The proposed approach mainly uses hash functions to provide the same functionality (aggregation of the users’ data consumption, data integrity check and dynamic pricing and billing) with preserving data privacy of the users.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"108 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76370101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A SURVEY ON THE USE OF DATA CLUSTERING FOR INTRUSION DETECTION SYSTEM IN CYBERSECURITY. 数据聚类技术在网络安全入侵检测系统中的应用综述。
Pub Date : 2020-01-01 DOI: 10.5121/ijnsa.2020.12101
Binita Bohara, Jay Bhuyan, Fan Wu, Junhua Ding

In the present world, it is difficult to realize any computing application working on a standalone computing device without connecting it to the network. A large amount of data is transferred over the network from one device to another. As networking is expanding, security is becoming a major concern. Therefore, it has become important to maintain a high level of security to ensure that a safe and secure connection is established among the devices. An intrusion detection system (IDS) is therefore used to differentiate between the legitimate and illegitimate activities on the system. There are different techniques are used for detecting intrusions in the intrusion detection system. This paper presents the different clustering techniques that have been implemented by different researchers in their relevant articles. This survey was carried out on 30 papers and it presents what different datasets were used by different researchers and what evaluation metrics were used to evaluate the performance of IDS. This paper also highlights the pros and cons of each clustering technique used for IDS, which can be used as a basis for future work.

在当今世界,如果不将计算设备连接到网络,很难实现在独立计算设备上运行的任何计算应用程序。大量的数据通过网络从一台设备传输到另一台设备。随着网络的不断扩展,安全问题日益受到关注。因此,保持高水平的安全性以确保设备之间建立安全可靠的连接变得非常重要。因此,入侵检测系统(IDS)用于区分系统上的合法和非法活动。在入侵检测系统中,有不同的技术用于检测入侵。本文介绍了不同研究人员在其相关文章中实现的不同聚类技术。这项调查是在30篇论文中进行的,它展示了不同的研究人员使用了哪些不同的数据集,以及使用了哪些评估指标来评估IDS的性能。本文还重点介绍了用于IDS的每种聚类技术的优缺点,这可以作为未来工作的基础。
{"title":"A SURVEY ON THE USE OF DATA CLUSTERING FOR INTRUSION DETECTION SYSTEM IN CYBERSECURITY.","authors":"Binita Bohara,&nbsp;Jay Bhuyan,&nbsp;Fan Wu,&nbsp;Junhua Ding","doi":"10.5121/ijnsa.2020.12101","DOIUrl":"https://doi.org/10.5121/ijnsa.2020.12101","url":null,"abstract":"<p><p>In the present world, it is difficult to realize any computing application working on a standalone computing device without connecting it to the network. A large amount of data is transferred over the network from one device to another. As networking is expanding, security is becoming a major concern. Therefore, it has become important to maintain a high level of security to ensure that a safe and secure connection is established among the devices. An intrusion detection system (IDS) is therefore used to differentiate between the legitimate and illegitimate activities on the system. There are different techniques are used for detecting intrusions in the intrusion detection system. This paper presents the different clustering techniques that have been implemented by different researchers in their relevant articles. This survey was carried out on 30 papers and it presents what different datasets were used by different researchers and what evaluation metrics were used to evaluate the performance of IDS. This paper also highlights the pros and cons of each clustering technique used for IDS, which can be used as a basis for future work.</p>","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"12 1","pages":"1-18"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.5121/ijnsa.2020.12101","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"39206844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Goodbye SIEM, hello SOARX 再见SIEM,你好SOARX
Pub Date : 2019-10-01 DOI: 10.1016/s1353-4858(19)30123-0
C. Tankard
{"title":"Goodbye SIEM, hello SOARX","authors":"C. Tankard","doi":"10.1016/s1353-4858(19)30123-0","DOIUrl":"https://doi.org/10.1016/s1353-4858(19)30123-0","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"1 1","pages":"20"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77747237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The state of operational technology security 运营技术安全状况
Pub Date : 2019-10-01 DOI: 10.1016/s1353-4858(19)30121-7
Steve Mansfield-Devine
{"title":"The state of operational technology security","authors":"Steve Mansfield-Devine","doi":"10.1016/s1353-4858(19)30121-7","DOIUrl":"https://doi.org/10.1016/s1353-4858(19)30121-7","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"20 1","pages":"9-13"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81800135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Map Reduce Implementation for Malicious Websites Classification 恶意网站分类的Map Reduce实现
Pub Date : 2019-09-30 DOI: 10.5121/ijnsa.2019.11503
Maminur Islam, Subash Poudyal, Kishor Datta Gupta
Due to the rapid growth of the internet, malicious websites [1] have become the cornerstone for internet crime activities. There are lots of existing approaches to detect benign and malicious websites — some of them giving near 99% accuracy. However, effective and efficient detection of malicious websites has now seemed reasonable enough in terms of accuracy, but in terms of processing speed, it is still considered an enormous and costly task because of their qualities and complexities. In this project, We wanted to implement a classifier that would detect benign and malicious websites using network and application features that are available in a data-set from Kaggle, and we will do that using MapReduce to make the classification speeds faster than the traditional approaches.[2].
由于互联网的快速发展,恶意网站[1]已经成为网络犯罪活动的基石。现有的检测良性和恶意网站的方法有很多,其中一些方法的准确率接近99%。然而,对恶意网站进行有效、高效的检测,现在从准确性上看已经足够合理,但从处理速度上看,由于其质量和复杂性,仍然被认为是一项巨大而昂贵的任务。在这个项目中,我们想实现一个分类器,它可以使用Kaggle数据集中可用的网络和应用程序特征来检测良性和恶意网站,我们将使用MapReduce来实现这一目标,使分类速度比传统方法更快[2]。
{"title":"Map Reduce Implementation for Malicious Websites Classification","authors":"Maminur Islam, Subash Poudyal, Kishor Datta Gupta","doi":"10.5121/ijnsa.2019.11503","DOIUrl":"https://doi.org/10.5121/ijnsa.2019.11503","url":null,"abstract":"Due to the rapid growth of the internet, malicious websites [1] have become the cornerstone for internet crime activities. There are lots of existing approaches to detect benign and malicious websites — some of them giving near 99% accuracy. However, effective and efficient detection of malicious websites has now seemed reasonable enough in terms of accuracy, but in terms of processing speed, it is still considered an enormous and costly task because of their qualities and complexities. In this project, We wanted to implement a classifier that would detect benign and malicious websites using network and application features that are available in a data-set from Kaggle, and we will do that using MapReduce to make the classification speeds faster than the traditional approaches.[2].","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"449 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86662608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
EUNICERT: Ethereum Based Digital Certificate Verification System EUNICERT:基于以太坊的数字证书验证系统
Pub Date : 2019-09-30 DOI: 10.5121/ijnsa.2019.11502
T. Huynh, Dang Khoa Pham
The fake certificate is a special global problem in today's digital age. Thousands of universities and educational institutions around the world do not exist but can release hundreds of millions of fake degrees. Verifying the integrity of qualifications is a real challenge for today's employers. Applying the anti-data modifying properties of blockchain technology, this study proposes a solution issuing and verifying digital certificates called EUniCert to solve this problem. By changing the design and integrating new consensus algorithm used in Ethereum platform into the Unicoin network that was used to verify and store the information related to the issued digital certificate, the EUniCert improves the latency to validate transactions as well as the number of verified blocks in the blockchain network compared to the previous solution that we have proposed. We implement a simple blockchain system to illustrate the management operation of the digital certificates on the ethereum platform. Besides, we conduct a simulation to evaluate the performance of our proposal compared with the previous system. The result is that the average latency decreases by 3.27 times as well as the number of verified blocks increases by 11% compared with the previous system.
假证书是当今数字时代一个特殊的全球性问题。世界上成千上万所不存在的大学和教育机构,却能发放数以亿计的假学位。对于今天的雇主来说,验证资格的完整性是一个真正的挑战。本研究利用区块链技术的反数据修改特性,提出了一种名为EUniCert的数字证书颁发和验证方案来解决这一问题。通过改变设计并将以太坊平台中使用的新共识算法集成到用于验证和存储与颁发的数字证书相关信息的unicin网络中,与我们提出的之前的解决方案相比,EUniCert改善了验证交易的延迟以及区块链网络中验证块的数量。我们实现了一个简单的区块链系统来说明以太坊平台上数字证书的管理操作。此外,我们还进行了仿真,比较了我们的方案与原有系统的性能。结果是,与以前的系统相比,平均延迟减少了3.27倍,验证块的数量增加了11%。
{"title":"EUNICERT: Ethereum Based Digital Certificate Verification System","authors":"T. Huynh, Dang Khoa Pham","doi":"10.5121/ijnsa.2019.11502","DOIUrl":"https://doi.org/10.5121/ijnsa.2019.11502","url":null,"abstract":"The fake certificate is a special global problem in today's digital age. Thousands of universities and educational institutions around the world do not exist but can release hundreds of millions of fake degrees. Verifying the integrity of qualifications is a real challenge for today's employers. Applying the anti-data modifying properties of blockchain technology, this study proposes a solution issuing and verifying digital certificates called EUniCert to solve this problem. By changing the design and integrating new consensus algorithm used in Ethereum platform into the Unicoin network that was used to verify and store the information related to the issued digital certificate, the EUniCert improves the latency to validate transactions as well as the number of verified blocks in the blockchain network compared to the previous solution that we have proposed. We implement a simple blockchain system to illustrate the management operation of the digital certificates on the ethereum platform. Besides, we conduct a simulation to evaluate the performance of our proposal compared with the previous system. The result is that the average latency decreases by 3.27 times as well as the number of verified blocks increases by 11% compared with the previous system.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"55 7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90050896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
International journal of network security & its applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1